Results 1 to 10 of about 56,459 (364)
Image vaccine against steganography in encrypted domain [PDF]
This paper investigates on the defense against steganography, and the overall purpose of the study is to design a satisfactory defense scheme in encrypted domain.
Xinran Li, Zichi Wang
doaj +2 more sources
Eigenfaces-Based Steganography [PDF]
In this paper we propose a novel transform domain steganography technique—hiding a message in components of linear combination of high order eigenfaces vectors. By high order we mean eigenvectors responsible for dimensions with low amount of overall image variance, which are usually related to high-frequency parameters of image (details).
Tomasz Hachaj +2 more
openaire +3 more sources
Digital steganography model and its formal description
In order to make the research of digital steganography model develop synchronously with steganography research, three digital steganography models from general to specific are proposed, and each model was formalized.
SONG Haitao, TANG Guangming, SUN Yifeng, WANG Yang
doaj +3 more sources
Random Matrix Transformation and Its Application in Image Hiding
Image coding technology has become an indispensable technology in the field of modern information. With the vigorous development of the big data era, information security has received more attention.
Jijun Wang, Fun Soo Tan, Yi Yuan
doaj +1 more source
ARPNetSteg: Network Steganography Using Address Resolution Protocol [PDF]
Steganography is a technique that allows hidden transfer of data using some media such as Image, Audio, Video, Network Protocol or a Document, without its existence getting noticed. Over the past few years, a lot of research has been done in the field of
Punam Bedi, Arti Dua
doaj +1 more source
Image hiding by using spatial domain steganography
This article provides an overview of steganography and its use for hiding images in other images. Steganography is a technique that allows users to hide information in plain sight, making it difficult for unauthorized parties to detect or access the ...
Ghazali Bin Sulong, Maria A.Wimmer
doaj +1 more source
Quantum Image Steganography Schemes for Data Hiding: A Survey
Quantum steganography plays a critical role in embedding confidential data into carrier messages using quantum computing schemes. The quantum variant of steganography outperforms its classical counterpart from security, embedding efficiency and capacity,
Nasro Min-Allah +7 more
doaj +1 more source
JPEG steganography with particle swarm optimization accelerated by AVX [PDF]
Digital steganography aims at hiding secret messages in digital data transmitted over insecure channels. The JPEG format is prevalent in digital communication, and images are often used as cover objects in digital steganography.
Bramas B +7 more
core +1 more source
Steganography and Steganalysis in Voice over IP: A Review
The rapid advance and popularization of VoIP (Voice over IP) has also brought security issues. VoIP-based secure voice communication has two sides: first, for legitimate users, the secret voice can be embedded in the carrier and transmitted safely in the
Zhijun Wu +3 more
doaj +1 more source
A novel steganography approach for audio files [PDF]
We present a novel robust and secure steganography technique to hide images into audio files aiming at increasing the carrier medium capacity. The audio files are in the standard WAV format, which is based on the LSB algorithm while images are ...
Abdulrazzaq, Sazeen T +2 more
core +1 more source

